Blocking as a way of stopping child sexual abuse material
Blocking Technologies
Blocking works on both the Internet Service Provider (ISP) level of the internet – where data travels through providers’ networks – and on single devices such as computers, tablets and mobile phones. Blocking technologies can pick up and block domains and URLs that are known to contain child sexual abuse material. However, these technologies cannot be used on other parts on the internet, such as the Darknet, social media networks and traditional emails. They can also not pick up content that has been encrypted.
A combination of blocking technologies and file detection technologies provides the most comprehensive protection when protecting work devices.
Blocking on ISP level
1. DOMAIN NAME SERVER (DNS) BLOCKING
Also known as DNS poisoning, this is the most common way to block online child sexual abuse material on ISP level.
Learn More2. DEEP PACKAGE INSPECTION (DPI)
This technology has the capability to look at all the traffic that flows through the ISPs networks, and in contrast to DNS Blocking …
Learn More3. URL BLOCKING
Instead of scrutinising all data, this technology looks at specific pages that have been put on a blocking list …
Learn More4. PROXYS AND FIREWALLS
The advantage of this technology is that it is possible, both theoretically and technologically, to look at encrypted material.
Learn More5. BLOCKING IN THE OPERATORS’ ROUTER
This is a cheap and simple solution, however also one of the more heavy-handed solutions that will block all pages on the ip-address …
Learn MoreBlocking on device level
6. URL BLOCKING
Using a uniquely sourced URL list it is possible to block URLs (web pages) known to contain child sexual abuse material…
Learn MoreBlocking is needed
Although encryption is being used more and more, and despite what could be construed as narrow perimeters, blocking covers a large part of the Internet and is very important in the fight to combat the spread of online child sexual abuse images, and the re-victimisation that happens every time an image or film is shared. Large amounts of child sexual abuse material is still stored, shared and distributed through the open internet and unencrypted websites.
About the Techincal Model National Response
Inspired by the WeProtect Global Alliance Model we have set out to develop an initiative that looks at technology. We call it the Technical Model National Response. It is an overview of the existing technologies that need to be applied by different sectors and businesses to effectively fight the spread of child sexual abuse material.